Identify the attack from following sequence of actions?

Identify the attack from following sequence of actions?

Step 1: A user logs in to a trusted site and creates a new session

Step 2: The trusted site stores a session identifier for the session in a cookie in the web browser

Step 3: The user is tricked to visit a malicious site

Step 4: the malicious site sends a request from the user’s browser using his session cookie
A . Web Application Denial-of-Service (DoS) Attack
B . Cross-Site Scripting (XSS) Attacks
C . Cross-Site Request Forgery (CSRF) Attack
D . Hidden Field Manipulation Attack

Answer: C

Latest 312-49v9 Dumps Valid Version with 547 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>